• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Toyota Halts Production Across Japan After Ransomware Attack

You are here: Home / General Cyber Security News / Toyota Halts Production Across Japan After Ransomware Attack
March 1, 2022

The world’s major carmaker has been forced to halt generation at all of its crops in Japan soon after a ransomware attack on a vital supplier, according to experiences.

Toyota claimed it would suspend 28 output strains at 14 factories on Tuesday, with a planned resumption thanks for Wednesday, in accordance to Nikkei.

The cyber-attack hit plastic components provider Kojima Industries and threatened to spill in excess of into Toyota’s IT methods by using its “Kanban” just-in-time production command technique, the report claimed. Toyota cyber-specialists are said to be on-website at Kojima to identify the affect and supply of the attack.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“It is correct that we have been strike by some form of cyber-attack,” an unnamed official “close” to Kojima Industries explained to Nikkei. “We are however confirming the destruction and we are hurrying to answer, with the best priority of resuming Toyota’s generation technique as soon as attainable.”

Also impacted are Toyota subsidiaries Hino Motors and Daihatsu Motor.

The Japanese carmaker sold 10.5 million vehicles in 2021, making it the world’s most significant producer for the 2nd yr operating.

Andy Kays, CEO of Socura, claimed factory IT and OT systems are so exposed by default that it’s “astounding” additional compromises never occur.

“Modern production providers these kinds of as Kojima Industries will have hundreds, if not hundreds, of linked units on web page. Each individual a person is a potential stage of attack and a level of failure. Combined with a factory’s sizeable workforce, its attack surface is substantial,” he argued.

“Old and out-of-date devices are also a difficulty. Even companies at the chopping edge of electronic transformation will commonly have some legacy equipment on the ground. Normally these are devices that are simply just far too previous to be up to date with the latest security patches, but as well highly-priced or significant to be replaced. In critical infrastructure and production, at times units are not able to be updated and restarted for the reason that companies cannot afford to pay for the downtime.”

The production sector was strike by additional ransomware attacks than any other final 12 months, according to a recent report from IBM.


Some sections of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Euro Police Bust Gang Linked to Migrant Smugglers
Next Post: Conti Encrypts Karma Ransom Note in Same Victim Network Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.